Aggregator
挪威开始在海底储存液化二氧化碳
Akira
You must login to view this content
Emora: An OSINT tool that allows you to search for accounts by username across social networks
[Control systems] CISA ICS security advisories (AV25-459)
45% кибергруппировок охотятся за Россией — не ради денег, а ради секретов
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), including the ability to extract and leak sensitive information cached by Apple Intelligence.
The post Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability appeared first on Microsoft Security Blog.
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), including the ability to extract and leak sensitive information cached by Apple Intelligence.
The post Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability appeared first on Microsoft Security Blog.
【技巧】SingleFile:我的网页文章保存方案
SecWiki News 2025-07-28 Review
更多最新文章,请访问SecWiki